Analysis

  • max time kernel
    147s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2022 11:32

General

  • Target

    PO.js

  • Size

    16KB

  • MD5

    d9cf358d33e0b914b807f31d6c58c5a7

  • SHA1

    8eea7bf764edac96eb2a06f3a7301f6cec2d2bb8

  • SHA256

    29ef503bce31e24fa949e6eac1c068019b0ef4d4f9ce91af55acde6d06698541

  • SHA512

    06802248fa1440aceb565efdad5ac752d6f2469add00a0e1decc3e398b53a2975f80b55924fe98402c0e3c2ca4850c842a77b1ba189ea0067934028a6e90f6a9

  • SSDEEP

    192:BdmxVneKi3B7oB8AmIufpDU1qLyAFsagU13pR8UAEbfK+bE+1FauvG6JY46272ii:eViR0B81Is61aykvpRrK+bZR72twdu

Malware Config

Extracted

Family

vjw0rm

C2

http://212.193.30.230:6505

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 7 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\PO.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\EUdyiwsLkK.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:2224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\EUdyiwsLkK.js

    Filesize

    5KB

    MD5

    fdb563c457afbde4219e1a83f742a8be

    SHA1

    8e217d47db9654e839273115479a2121745250a5

    SHA256

    eedb0f6bd119171b632c131672eb59ac547464ddaf727a062af3c4b27edfbe49

    SHA512

    0c8eacd5a8d82fe264a11611630211438ae3721f93a4610a530312d08ae7e87689527c82640a22b7287c2d38add261ed75c4fbcdb0e27f427726c920b623a81c